共 50 条
- [21] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
- [22] An authenticated group key transfer protocol using elliptic curve cryptography Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
- [23] A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019), 2019, : 73 - 80
- [25] Point choosing algorithm of elliptic curve cryptography Lu, Chen, 2000, Xi'an Jiaotong Univ, China (34):
- [26] Research and Optimizing of the Algorithm of Elliptic Curve Cryptography INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1219 - 1225
- [27] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
- [29] An authenticated key exchange protocol in elliptic curve cryptography JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705